Iran, long considered a steady and persistent cyber threat to the U.S., has raised its game in the months since the two nations went to war in February.
Iranian-backed cyber threat groups, which range from state-sponsored actors to pro-Iranian hacktivists and financially motivated hackers, appear to have evolved some of their motivations and capabilities in cyber, according to analysts and security researchers.
“What we are seeing are attacks that are aiming to have a more destructive effect,” Annie Fixler, director of the Center on Cyber and Technology Innovation (CCTI) at the Foundation for Defense of Democracies told Cybersecurity Dive.
What we are seeing are attacks that are aiming to have a more destructive effect.

Annie Fixler
Director of the Center on Cyber and Technology Innovation (CCTI) at the Foundation for Defense of Democracies
Specifically, Iran-linked actors have increased the use of data wiping malware in recent attacks against Israel and demonstrated greater capability to evade detection, according to researchers at Palo Alto Networks.
In another alarming development, Darktrace last week published an analysis of a malware strain called ZionSiphon, to potentially tamper with chlorine levels and pressure controls in Israeli water facilities. The malware was embedded with pro-Iran and Palestinian messaging for additional psychological impact.
Recent military strikes by Iran may have combined exploitation of flaws in video cameras and kinetic military strikes, according to Check Point Research. The activity may indicate a higher level of coordination and could be used potentially against critical infrastructure, surveillance and other targeted threat activity, CCTI’s Fixler noted.
Meanwhile, the bombing campaign by the U.S. and Israel exposed weaknesses in Iran’s traditional military capabilities, such as its limited ability to control and defend its own airspace and directly challenge allied bombing campaigns. But the Iranians have used cyberattacks as a way to send messages to neighboring Gulf states, Israel, the U.S., and to its own political dissidents, for intimidation, espionage and destructive acts.
Iran-nexus hackers target critical infrastructure
-
February 28U.S. and Israel launch coordinated bombing campaign against Iran.
-
March 11Medtech company Stryker hit by wiper attack.
-
March 19DOJ announces seizure of domains linked to Handala.
-
April 7FBI, CISA warn of Iran-nexus hackers targeting flaws at water, energy providers.
Cyber threat warnings
In March, cyber-threat-sharing groups across various critical infrastructure sectors issued a joint advisory warning about the heightened threat of cyberattacks from Iran-aligned actors.
“Since we released the report, we have indeed seen reports from the critical infrastructure community about Iranian-aligned activity,” Scott Algeier, executive director of the Information Technology-ISAC, told Cybersecurity Dive.
The data-wiping cyberattack on medical device maker Stryker in March represented the most high-profile example of an Iran-linked attack, Algeier noted, but there have been reports of cyberattacks targeting critical sites as well. Iran-nexus actors are continuing to focus on programmable logic controllers used in OT environments, for instance, he said.
Nick Andersen, acting director at CISA, said at a Thursday hearing before the House Appropriations Subcommittee on Homeland Security that Iran-linked actors have stepped up activity against poorly configured critical infrastructure sites in the U.S., but have thus far been unable to make significant inroads.
CISA and other agencies have warned for several years about hacktivist groups exploiting weak security controls at critical infrastructure sites.
Anderson noted the U.S. has a “tremendous amount” of IT and OT being used to support critical infrastructure that is exposed to the public internet, unsecured and “not necessarily taking advantage of modern security practices” like changing default passwords.
“When we look at them [Iran] as a specific nation-state threat actor, they’ve been very opportunistically focused where we see unsecured devices that are internet accessible,” Andersen testified during the hearing. “It provides them with an opportunity to attempt to make connections to those devices.”
When we look at them [Iran] as a specific nation-state threat actor, they’ve been very opportunistically focused where we see unsecured devices that are internet accessible.

Nick Andersen
Acting Director at CISA
CISA and the FBI, meanwhile, led a joint advisory about the Iran-nexus threat activity on April 7, warning that malicious hackers were targeting Rockwell Automation/Allen-Bradley devices at water utilities, energy facilities and other industrial sites.
The advisory, which was co-authored by the U.S. Department of Energy, the Environmental Protection Agency and other federal partners, warned that attackers tried to manipulate human machine interfaces and supervisory control and data acquisition displays.
While authorities have not provided details breaking down the specific pattern of attacks, researchers have been able to trace some of the activity to specific threat groups.
Palo Alto Networks Unit 42 linked a cluster of threat activity in late March to the same Rockwell Automation devices cited in the FBI advisory, according to an updated blog post released Friday.
A threat group tracked as CL-STA-1128 (also tracked as Cyber Av3ngers or Storm-0784) abused Rockwell Automation’s Factory Talk software by installing it onto virtual private server infrastructure, according to Unit 42 researchers.
Asymmetric cyber capabilities
Iran in recent years has demonstrated the ability to leverage a network of state-sponsored and hacktivist operatives to sow fear, discord and operational disruption via cyber campaigns.
U.S. authorities, including CISA, have tracked a group of advanced persistent threat actors since at least 2018 under the name MuddyWater, also known as Seedworm or Static Kitten. The group, operating under Iran’s Ministry of Intelligence and Security (MOIS), has targeted rival governments, defense industries, telecommunications and energy providers through spear phishing, exploitation of known vulnerabilities and abuse of open source tools for conducting cyber espionage, stealing sensitive data and deploying ransomware.
In 2022, the U.S. Treasury sanctioned MOIS in connection with threat activity against the U.S. and other allies dating back to 2007. Treasury cited a July 2022 cyberattack against the Albanian government, where an Iran-linked group called HomeLand Justice gained access to a targeted computer network for 14 months before unleashing ransomware and disk-wiping malware.
Iran also has long used cyber to target critical infrastructure against Israel, its leading geopolitical rival. During the Gaza War starting in 2023, these attackers also targeted water utilities and other critical infrastructure in the U.S.
Drinking water and wastewater treatment facilities in the U.S. also have been victims of Iran-linked cyberattacks, specifically in a campaign that exploited weaknesses in Unitronics PLCs. The U.S. has about 150,000 public water facilities and 16,000 wastewater treatment sites, most of which lack the manpower, funding or training to thwart such attacks.
The water sector has traditionally been a relatively easy target. A federal probe in 2024 found hundreds of U.S. water sites were either exposed to the internet or contained other configuration weaknesses. The report also found the Environmental Protection Agency lacked an incident reporting plan or documented procedures to coordinate with CISA.
Security industry leaders say the current cyber threat to water and other utilities represents a clear escalation of capabilities by Iran-linked threat groups.
Jennifer Lyn Walker, director of infrastructure cyber defense at the Water Information Sharing & Analysis Center, said the prior activity linked to CyberAv3ngers was more of a “nuisance threat” that lacked sophistication. But the current threat activity represents an “escalation to include intent to cause disruption with malicious actions,” Walker told Cybersecurity Dive.
Despite the recent threat activity, the EPA said drinking water remains secure.“The ability of water systems to deliver safe drinking water to communities has not been impacted,” a spokesperson said.
The feds have taken some action against Iranian threat actors: following the attacks on water systems and other critical sectors, the Treasury Department in 2024 issued sanctions against members of the Islamic Revolutionary Guard Corp., citing malicious activity against various critical sectors in the U.S. Among those attacks was an 2021 ransomware attack targeting Boston Children’s Hospital that was disrupted by the FBI.
Hackers gain persistence
The cyberattack against Stryker demonstrated a capability that exceeds what was previously known about Iran-linked actors: the deployment of a destructive wiper that abused the company’s Microsoft Intune environment and deleted data from thousands of mobile devices.
CCTI’s Fixler and other analysts say the attackers likely obtained credentials and established a foothold in Stryker long before the attack. However, the attack remains under investigation, so an official breakdown has not yet been released.
Handala, the cyber threat group linked to the Stryker attack, now claims to have gained persistent access to Microsoft Entra, VMware vSphere and IBM FlashSystem environments across multiple targeted organizations, according to researchers at Flashpoint.
“The screenshots that they shared in their channel indicate that these are part of several attack campaigns, though it is difficult to verify until we have confirmation from the victims,” Ian Grey, VP of intelligence at Flashpoint, told Cybersecurity Dive.
Those screenshots show the attackers’ ability to generate Temporary Access Passes within Microsoft Entra, which allows the hackers to bypass multifactor authentication, according to Flashpoint.
Microsoft officials declined to comment. IBM and Broadcom officials were not immediately available for comment.
In March, CISA urged security teams across the country to harden their endpoint security following the Stryker attack.
Defending against Iran cyber threats
There are several steps that security teams should take to mitigate against potential attacks from Iran-nexus threat actors. For one, internet-facing devices should be removed from open access, and multifactor authentication should be enabled, according researchers.
Security teams should also create strong backup copies of PLCs, which include the logic and configurations for industrial equipment and systems.
If controllers include a physical mode switch, it should be placed in the run position to prevent remote modification, according to the CISA and FBI advisory.
To protect against wiper attacks, security teams should eliminate standing privileges and also harden Entra ID administrator accounts, according to Palo Alto Networks researchers.